Package "pixman"

Name: pixman


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • pixel-manipulation library for X and cairo
  • pixel-manipulation library for X and cairo (debugging symbols)
  • pixel-manipulation library for X and cairo (development files)

Latest version: 0.30.2-1ubuntu0.
Release: precise (12.04)
Level: updates
Repository: main


Other versions of "pixman" in Precise

Repository Area Version
base main 0.24.4-1
security main 0.30.2-1ubuntu0.

Packages in group

Deleted packages are displayed in grey.


Version: 0.30.2-1ubuntu0. 2021-05-03 16:06:21 UTC

  pixman (0.30.2-1ubuntu0. precise-security; urgency=medium

  [ Marc Deslauriers ]
  * SECURITY UPDATE: general_composite_rect() integer overflow
    - debian/patches/CVE-2015-5297-pre1.patch: ensure that iter buffers are
      aligned to 16 bytes in pixman/pixman-general.c,
      pixman/pixman-private.h, pixman/pixman-utils.c.
    - debian/patches/CVE-2015-5297-pre2.patch: use floating point combiners
      for all operators that involve divisions in pixman/pixman-general.c.
    - debian/patches/CVE-2015-5297-1.patch: fix stack related pointer
      arithmetic overflow in pixman/pixman-general.c.
    - debian/patches/CVE-2015-5297-2.patch: tighten up calculation of
      temporary buffer sizes in pixman/pixman-general.c.
    - debian/patches/disable_test.patch: disable blitters test as the
      correct CRC is unknown.
    - CVE-2015-5297

 -- <email address hidden> (Leonidas S. Barbosa) Tue, 11 Dec 2018 13:01:55 -0300

Source diff to previous version
CVE-2015-5297 general_composite_rect() integer overflow

Version: 0.30.2-1ubuntu0. 2016-03-03 16:07:14 UTC

  pixman (0.30.2-1ubuntu0. precise-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code execution via
    overflow in create_bits
    - debian/patches/CVE-2014-9766.patch: cast to size_t in
    - CVE-2014-9766

 -- Marc Deslauriers <email address hidden> Wed, 02 Mar 2016 16:13:35 -0500

Source diff to previous version
CVE-2014-9766 create_bits(): Cast the result of height * stride to size_t

Version: 0.30.2-1ubuntu0. 2014-12-09 22:06:26 UTC

  pixman (0.30.2-1ubuntu0. precise-security; urgency=medium

  * No change rebuild in the security pocket
 -- Marc Deslauriers <email address hidden> Sat, 06 Dec 2014 10:45:18 -0500

Source diff to previous version

Version: 0.30.2-1ubuntu0. 2014-01-06 15:07:01 UTC

  pixman (0.30.2-1ubuntu0. precise-proposed; urgency=low

  * Copy saucy package back to precise. (LP: #1253041)
 -- Maarten Lankhorst <email address hidden> Tue, 10 Dec 2013 13:26:08 +0100

Source diff to previous version

Version: 0.24.4-1ubuntu0.1 2013-12-03 23:06:52 UTC

  pixman (0.24.4-1ubuntu0.1) precise-security; urgency=low

  * SECURITY UPDATE: Fix underflow when bottom is close to MIN_INT
    - debian/patches/security-lp1197921.patch: verify (t)->bottom > (t)->top)
    - LP: #1197921
 -- Jamie Strandboge <email address hidden> Tue, 03 Dec 2013 12:16:20 -0600

About   -   Send Feedback to @ubuntu_updates